[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: REMINDER: RADEXT WG Last Call on "Crypto-Agility Requirements for RADIUS"
Following up...
> It comes down to the RADIUS client advertising what it can
> support, by means of hint attributes included in the
> Access-Request packet, and the RADIUS server picking at most
> one of the options.
So, it is apparent that use of encrypted packet payloads (either the entire
PDU or per attribute) cannot succeed until the cipher-suite is selected and
the client and server find that they share the required keys. Without
getting into *design* of a solution, it seems feasible to me that the client
could "discover" the existence a cipher-suite and keys shared in common with
the server, without exposing any sensitive information using "classic"
RADIUS exchanges, by simply using a device such as the Call-Check mechanism,
to complete an Access-Request / Access-Accept (or Access-Reject) sequence
without disclosing any end user credentials.
--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>